Often, the biggest problem facing Security Operations Centers is not an inability to detect security threats, but rather the methods how to address those threats. With their reliance on manual processes and disconnected solutions, security analysts remain overwhelmed with [ false] alerts and lack the power to be effective at their jobs. There is an increased need to coordinate multiple security products and processes across the organization to manage tools and processes effectively; and ensure a streamlined task flow from detection to threat response and remediation. Implementing Security Orchestration enables organizations to collect security threats data and alerts from difference sources, increase resources on important tasks by automating repetitive tasks; ensure a faster response to incidents by automating integration, investigation & response; and have a stronger defense with the integration of existing security infrastructure. Having said that, security orchestration is not a plug and play wonder solution. Effective security orchestration requires a tightly organization that provides robust capabilities across a multitude of components. At the end of the day, the effectiveness of orchestration is only as strong as the weakest link.
Attendees – Restricted Audiences
The agenda is still under development, visit this page regularly for updates with abstracts and speakers. Confirmed speakers include Huawei Technologies, ATOS, Splunk, CyberSponse / Fortinet, FireEye, ATAR Labs. Invited and to be confirmed: CloudLock/ Cisco, ThreatQ, Siemplify...
Security Orchestration Summit - SOAR 2020
December 8th 2020, Zoom Webinar
Register Now : https://us02web.zoom.us/webinar/register/WN_Q-db8KJ8QN6aQk2IXBbeLw